NIST Cybersecurity for IoT

30
NIST Cybersecurity for IoT: Katerina Megas Program Manager, NIST Cybersecurity for IoT Program ISPAB 04 March 2021

Transcript of NIST Cybersecurity for IoT

Page 1: NIST Cybersecurity for IoT

NIST Cybersecurity for IoT:

Katerina MegasProgram Manager,

NIST Cybersecurity for IoT ProgramISPAB 04 March 2021

Page 2: NIST Cybersecurity for IoT

• Non-Regulatory agency and technical arm of the U.S. Department of Commerce

• NIST’s mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

• In accordance with the Federal Information Security Modernization Act (FISMA), NIST develops information security standards and guidelines for federal information systems.

The IoT Cybersecurity Program coordinates across NIST on IoT security

IoT cybersecurity related initiatives

Research/Reports

• Mitigating IoT-Based DDoS/Botnet Report• Cybersecurity for Cyber Physical Systems

• Cybersecurity Framework

• Cybersecurity Framework Manufacturing Profile

• Cybersecurity for Smart Grid Systems

• Cyber Threat Information Sharing

• Lightweight Encryption• Low Power Wide Area IoT

• Network of Things

• Report on State of International Cybersecurity Standards for IoT

• Security and privacy concerns of intelligent virtual assistances

• Security of Interactive and Automated Access Management Using Secure Shell (SSH)

• Considerations for Managing IoT Cybersecurity and Privacy Risks

• Core Cybersecurity Feature Baseline for Securable IoT Devices

• Trustworthy Network of Things

Applied• Galois IoT Authentication & PDS Pilot• GSMA Trusted Identities Pilot• National Vulnerability Database• Securing the Industrial IoT (IIoT)• IIoT-Based Automated Distributed

Threats• Capabilities Assessment for Securing

Manufacturing Industrial Control Systems• Security Review of Consumer Home IoT

Products• Security for IoT Sensor Networks• Healthcare Sector Projects

• Wireless Infusion Pumps• Securing Telehealth Remote Patient

Monitoring Ecosystem• Privacy Engineering Program• Zero Trust Architecture Project• IoT Device Network-Layer Onboarding

Taxonomy

Special Publications• BLE Bluetooth• Cloud security• Digital Identity Guidelines• Guide to Industrial Control Systems

(ICS) Security• RFID Security Guidelines• Software Assessment Management

Standards and Guidelines• Supply Chain Risk Management• Security Content Automation Protocol

(SCAP) Standards and Guidelines• Security Systems Engineering• ABCs of Conformity Assessment• Conformity Assessment Considerations

for Federal Agencies

Page 3: NIST Cybersecurity for IoT

Program Principles Guiding Our Efforts

Risk-BasedUnderstanding

Ecosystem of Things

Outcome-Based Approach

Stakeholder Engagement

No One-Size-Fits-All

Cybersecurity for IoT

Program Principles

Focus on how IoT characteristics

affect system and organizational

cybersecurity risk

No device exists in a vacuum, so

look at entire ecosystem not

just IoT endpoints Specify desired outcomes, and allow

providers and customers to choosebest solutions for their devices andenvironments

Collaborate with diverse stakeholders regarding tools, guidance, standards, and resources

Allow for diversity of approaches and solutions across industries, verticals, and use cases

Page 4: NIST Cybersecurity for IoT

Key Events In the IoT Cybersecurity Program

NISTIR 8201(Dec 2017)

• NIST IR 8200• Takeaways from Oct 2017

Colloquium• IoT did introduce new risks

and challenges• No one size fits all• Would require an

ecosystem approach• Risk based understanding• Outcome based

• Lots of existing guidance applicable

• Focus on the gaps• Provide guidance to help tie

together all the guidance

NISTIR 8228(June 2019)

• Focuses on what is different about managing risks associated with the use of IoT

• Frames IoT risks and challenges in the context of implementation of SP800-53 controls and Cybersecurity Framework

• Customers dependent on security capabilities of IoT devices

NISTIR 8259 / 8259A(May 2020)

• Three public workshops, two public comment periods and over 600 comments

• Cybersecurity recommendations for IoT device manufacturers

• Activities for manufacturers to incorporate into product development lifecycle

• Six core Cybersecurity capabilities for IoT devices

Federal Profile Workshop(Jul 2020)

• Published on GitHub analysis of SP 800-53 controls dependencies on IoT device capabilities. Suggested this to be a ‘catalogue’ for agency use

• Takeaways• Confirmed device centric

approach useful• Confirmed that non-

technical dependencies need to be identified

• Confidence mechanisms desired for the market but more discussions required

4 Public Drafts(Dec 2020)

• Non-Technical Supporting Activities Baseline recommended for all IoT device manufacturers

• NIST published the process NIST followed to adapt the baseline to Federal agency use case

• Starting point for agencies in a Federal profile identifying the key capabilities likely needed to support agency implementation of Low baseline

• Guidance for Federal Agencies with considerations for IoT risk in agency RMF processes and how to develop requirements for IoT devices leveraging catalogue and Federal profile

XXXXBotnet Report (May 2018)

Botnet Roadmap (Nov 2018)

Botnet Report Update (July 2020)

IoT Cybersecurity Improvement Act

(Dec 2020)

Page 5: NIST Cybersecurity for IoT

Existing NIST cybersecurity-related guidance is technology-neutral and applicable to IoT

The Internet of Things (IoT) Cybersecurity Improvement Act of 2020 (Public Law (PL) 116 207) directs NIST to publish “standards and guidelines for the Federal Government on the appropriate use and management by agencies of Internet of Things devices”

Cybersecurity Framework

Integrating Cybersecurity and Enterprise Risk Management

NIST Risk Management Framework

Security and Privacy Controls for Information Systems and Organizations

Supply Chain Risk Management Practices for Federal Information Systems

• NIST has developed cybersecurity-related guidance that is device-neutral and highly applicable to all IoT devices.

• IoT device cybersecurity should be addressed within a risk management hierarchy from enterprise-level through organization, system, and finally component level, where IoT devices are understood as system components with a distinctive set of risk characteristics

Page 6: NIST Cybersecurity for IoT

In June 2020 we published a working description of IoT to frame our publication

• NISTIR 8259 described IoT devices as having:

This is the definition used in U.S. Public Law 116-207, IoT Cybersecurity Improvement Act of 2020

At least one transducer for interacting directly with the physical world(e.g., a sensor or actuator)

& At least one network interface for interfacing with the digital world

(e.g., Ethernet, Wi-Fi, Bluetooth, Long-Term Evolution [LTE], Zigbee, Ultra-Wideband [UWB])

Page 7: NIST Cybersecurity for IoT

NIST published recommendations which can be used across a wide range of IoT devices in NIST IR 8259A (May 2020)

Profiles can be developed building on the core baseline to define the market or vertical specific needs

• Risk-Based Understanding: Our approach to managingrisk is rooted in an understanding of how IoT can affectcybersecurity.

• Ecosystem of Things: Recognizing that no device existsin a vacuum, NIST takes an ecosystem approach to IoTcybersecurity.

• Outcome-Based Approach: Specify desired cybersecurityoutcomes, allowing organizations to choose the bestsolution for each IoT device.

• No One Size Fits All: There is no one-size-fits-all approachto managing IoT cybersecurity risk.

• Stakeholder Engagement: NIST works with diversestakeholders to advance IoT cybersecurity.

Program Principles

Page 8: NIST Cybersecurity for IoT

Four new publications create a framework for profiling requirements for devices

New Public Drafts

Previously Published

Page 9: NIST Cybersecurity for IoT

Identified non-technical capabilities that might be broadly applicable and could be considered ‘core’

NISTIR 8259A (May 2020)Technical Baseline

Device Identification

Logical Accessto Interfaces

Device Configuration

Software Update

Data Protection

Cybersecurity State Awareness

Draft NISTIR 8259B (Dec 2020)Non-Technical Baseline

Documentation

Information & Query Reception

Information Dissemination

Education & Awareness

Cybersecurity controls consist of People, Processes, and Technology

Page 10: NIST Cybersecurity for IoT

Some examples of non-technical capabilities that a manufacturer can consider during IoT product development

Page 11: NIST Cybersecurity for IoT

NISTIR 8159D, Profile Using the IoT Core Baseline and Non-Technical Baseline for the Federal Government

The Federal Profile provides a starting point for agencies to consider as they identify requirements for IoT devices

NIST IR 8259D profiles and adapts the Core Baseline in 8259B to Federal agency needs

Page 12: NIST Cybersecurity for IoT

Step 1. Primary Source Documents

Page 13: NIST Cybersecurity for IoT

• Device Centricity • Many documents are at the

organization/system level • Extract device centric requirements

implied by organization level documents • Most documents are device neutral

• Cybersecurity focused documents selected• Minimal Securability

• Focus on Low impact baseline from NIST SP 800-53B: Control Baselines for Information Systems and Organizations

2. Assess How Documents Support…

Page 14: NIST Cybersecurity for IoT

• Device Centricity • Elaborated on the core baseline and non-technical baseline with a catalog

of device-centric, cybersecurity- focused capabilities that would typically be needed by federal government organizations to implement 800-53 controls

• Identified cluster of capabilities which did not fit within core technical baseline

• Focus on device capabilities needed for cybersecurity • Minimal Securability

• Using the controls from the low-impact RMF baseline from SP 800-53B as guidance, device cybersecurity capabilities and non-technical supporting capabilities were selected from the catalog for inclusion in the federal profile

3. Apply the Three Concepts to Source Documents

Page 15: NIST Cybersecurity for IoT

• Device Securability• The IoT device can operate securely by protecting its hardware and software integrity

and securely utilizing system resources, managing communications, and executing code.

We identified an additional technical capability for IoT devices

Page 16: NIST Cybersecurity for IoT

SP 800-213, IoT Device Cybersecurity Guidance for the Federal Government:Establishing IoT Device Cybersecurity Requirements• When agencies determine that the risk or

type of device requires additional controls beyond minimal securability or modification, agencies should consult the IoT Device Security Capabilities Catalogue to select additional capabilities to require of the device.

Draft Special Publication 800-213 provides guidance for federal agencies to consider as they establish requirements

Page 17: NIST Cybersecurity for IoT

NISTIR 8159C, Creating a Profile Using the IoT Core Baseline and Non-Technical Baseline

Profiling: Process For Applying The Baselines

Page 18: NIST Cybersecurity for IoT

NIST rolled out first OLIR mapping of NIST recommendations to standard.. more to come

Page 19: NIST Cybersecurity for IoT

Securing Telehealth Remote Patient Monitoring

Consumer Home IoT Product Security

• Protecting Information and System Integrity in Industrial Control Systems

• Securing Wireless Infusion Pumps• Securing Picture Archiving and

Communication System• Securing Property Management Systems • Security for 5G• Securing the Industrial IoT: Distributed

NIST mapping NCCoE projects implementation guidance to NIST recommendations for capabilities in IoT devices

MitigatingIoT-BasedDDOS

Page 20: NIST Cybersecurity for IoT

NIST is expanding work on key areas

Consumer devices applying the guidance in NIST IR 8259• Updates to NIST IR 8267 Security Survey of

Consumer Home Internet of Things (IoT) Products and

• Workshop on Cybersecurity Risks in Consumer Home IoT Products (October 2020)

STANDARDS

CA PROCESS

CONFORMANCE

…plug-n-play to the internet

20

Confidence mechanisms for the marketplace

• A white paper: We want to have confidence in the security of IoT Devices: How to get there?

Page 21: NIST Cybersecurity for IoT

Next steps

21

Held a public webinar and a number of roundtable discussions with stakeholders pre-closing of the public comment period. Public comments closed: February 26, 2021• Preliminary high level themes in comments:• What is the risk of adding an IoT device to a government network?

• Various views of how this risk should be characterized.• Various views on the problem of fragmentation:

• Market fragmentation• Policy fragmentation• Different agencies defining IoT cybersecurity requirements differently

• Many IoT devices are too constrained to be able to support the requirements• Precluding use of large numbers of IoT devices by government

• Templates of requirements for different types of devices are needed• Call to make distinctions among device “types”• Tentative public workshop: April 2020

Page 22: NIST Cybersecurity for IoT

Have a question or an idea? We want to hear from you! We’re always accepting thoughtful feedback at

[email protected]

https://www.nist.gov/programs-projects/nist-cybersecurity-iot-program

@NISTcyber#IoTSecurityNIST

[email protected]

We welcome your written feedback at:

[email protected]

Page 23: NIST Cybersecurity for IoT

NISTIR 8159C, Creating a Profile Using the IoT Core Baseline and Non-Technical Baseline

Profiling: Process For Applying The Baselines

Page 24: NIST Cybersecurity for IoT

NISTIR 8159D, Profile Using the IoT Core Baseline and Non-Technical Baseline for the Federal Government

Federal Profile: A Worked Example

Page 25: NIST Cybersecurity for IoT

SP 800-213, IoT Device Cybersecurity Guidance for the Federal Government:Establishing IoT Device Cybersecurity Requirements

Guidance for Federal Agencies

Page 26: NIST Cybersecurity for IoT

• Background on the NIST ITL & the Cybersecurity for IoT Program

• Review• Program History• Published Guidance• Draft Guidance• Next Steps

Agenda

Page 27: NIST Cybersecurity for IoT

• Non-Regulatory agency and technical arm of the U.S. Department of Commerce

• NIST’s mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

• In accordance with the Federal Information Security Modernization Act (FISMA), NIST develops information security standards and guidelines for federal information systems.

The IoT Cybersecurity Program coordinates across NIST on IoT security

IoT cybersecurity related initiatives

Research/Reports

• Mitigating IoT-Based DDoS/Botnet Report• Cybersecurity for Cyber Physical Systems

• Cybersecurity Framework

• Cybersecurity Framework Manufacturing Profile

• Cybersecurity for Smart Grid Systems

• Cyber Threat Information Sharing

• Lightweight Encryption• Low Power Wide Area IoT

• Network of Things

• Report on State of International Cybersecurity Standards for IoT

• Security and privacy concerns of intelligent virtual assistances

• Security of Interactive and Automated Access Management Using Secure Shell (SSH)

• Considerations for Managing IoT Cybersecurity and Privacy Risks

• Core Cybersecurity Feature Baseline for Securable IoT Devices

• Trustworthy Network of Things

Applied• Galois IoT Authentication & PDS Pilot• GSMA Trusted Identities Pilot• National Vulnerability Database• Securing the Industrial IoT (IIoT)• IIoT-Based Automated Distributed

Threats• Capabilities Assessment for Securing

Manufacturing Industrial Control Systems• Security Review of Consumer Home IoT

Products• Security for IoT Sensor Networks• Healthcare Sector Projects

• Wireless Infusion Pumps• Securing Telehealth Remote Patient

Monitoring Ecosystem• Privacy Engineering Program• Zero Trust Architecture Project• IoT Device Network-Layer Onboarding

Taxonomy

Special Publications• BLE Bluetooth• Cloud security• Digital Identity Guidelines• Guide to Industrial Control Systems

(ICS) Security• RFID Security Guidelines• Software Assessment Management

Standards and Guidelines• Supply Chain Risk Management• Security Content Automation Protocol

(SCAP) Standards and Guidelines• Security Systems Engineering• ABCs of Conformity Assessment• Conformity Assessment Considerations

for Federal Agencies

Page 28: NIST Cybersecurity for IoT

Ecosystem of Things

Recognizing that no device exists in a vacuum, NIST takes an ecosystem approach to IoT cybersecurity. For many devices, much of the functionality happens outside the device—not all the security is on the device itself. As such, we look at the entire ecosystem, not just endpoints.

No One Size Fits All

Each organization has its own risk tolerance and mission needs, and no one set of controls will address the wide range of cross-industry and cross-vertical needs and use cases. There is no one-size-fits-all approach to managing IoT cybersecurity risk.

Stakeholder Engagement

NIST works with diverse stakeholders to advance IoT cybersecurity. This includes collaborating with stakeholders to provide the necessary tools, guidance, standards, and resources.

Risk-Based UnderstandingIoT capabilities, behaviors, deployment environments, and other characteristics can affect cybersecurity risk. Our approach to managing this risk is rooted in an understanding of how IoT can affect it.

Outcome-Based Approach

Embrace the Cybersecurity Framework’s outcome-based approach. Specify desired cybersecurity outcomes, not necessarily how to achieve those outcomes, which allows organizations to choose the best solution for each IoT device and/or their enterprise environment.

Cybersecurity for IoT Program

Principles

Core Principles Guide the program Efforts

Page 29: NIST Cybersecurity for IoT

NISTIR 8228: Considerations for Managing IoT Cybersecurity and Privacy RisksDiscusses how IoT may affect risk and where expectations of customers and challenges

may exist when applying existing risk management frameworks

Appendix A identifies where capabilities on the device could address some of the challenges

Protect Device Security Protect Data Security Protect Individual’s Privacy

Asset Management

VulnerabilityManagement

AccessManagement

Device Security Incident Detection

Data Protection

Data Security Incident Detection

Information Flow Management

PII Processing Permissions Management

Informed Decision Making

Disassociated Data Management

Privacy Breach Protection

Page 30: NIST Cybersecurity for IoT

Risk management frameworks exist for the organization using IoT devices: what about what about the manufacturer?

Manufacturers/Producers

Products: IoT Devices

Consumers (Individual or

Enterprise)

Information and Operational

Systems (where IoT Devices are integrated)

Cybersecurity FrameworkRisk Management Framework